Redundancy in Public-Private Key PairsLaverna J. ThurstonAbstractThe improvement of active networks is a compelling question. In this paper, we prove the emulation of journaling file systems. Our focus in this work is not on whether the much-touted lossless algorithm for the refinement of forward-error correction by Harris  is recursively enumerable, but rather on introducing an interposable tool for enabling cache coherence (Tarpon). Topic: algorithm
Canada's own Tori and James (phlux) Brine, producing great sounding electronic music for the masses! We started this project in the late 1998. I decided to experiment with keyboards and synthesizers and started to get a little bit more serious with the idea. When I had produced my first (and roughest) CD, I sent it to my sister and she decided to add a little more to what I had composed. Since then, we have been expanding our ideas and trying to let the world hear what we have been making. I... Topic: Algorithm
Melodies based on MIDImage 3 Demo Manipulated in Cubase Elements 7 Composed by Ludwig 3 (Chess algorithms) Mastered in Wavelab Elements 7 by using Reaktor 5.9 Ludwig songbase: MIDImage 3 more songbases for Ludwig 3 are here http://archive.org/details/Ludwig3-Addons Topic: algorithm composing
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the... Topics: NIDS, Evasion, Apriori Algorithm, AdaBoost Algorithm, Snort
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the... Topics: NIDS, Evasion, Apriori Algorithm, Adaboost Algorithm, Snort
Self Portrait using variation on the Mandelbrot Set equation, and a genetic algorithm that finds parameters that generate images using a 50X50 gif image of Ventrella's face as a fitness function. See http://www.ventrella.com/Tweaks/Portraits/ for more info Topics: Mandelbrot, portrait, genetic algorithm
Several robust eigenstructure assignment methods for MIMO systems try to exploit non-uniqueness of controller matrix to optimize certain performance index. In general these methods lead to computational intractability or become too conservative design. Therefore the scope of using randomized algorithms as an alternative exists. Based on well established statistical learning theory algorithms this paper provides methodologies to design robust controller under structured uncertainty by... Topics: Robust Eigenstructure, Randomized Algorithm
An open source book that describes a large number of algorithmic techniques from the the fields of Biologically Inspired Computation, Computational Intelligence and Metaheuristics in a complete, consistent, and centralized manner such that they are accessible, usable, and understandable.https://github.com/jbrownlee/CleverAlgorithms Topics: compsci, algorithm, genetic
In this course design and analysis of algorithms is studied. Methodologies include: divide and conquer, dynamic programming, and greedy strategies. Their applications involve: sorting, ordering and searching, graph algorithms, geometric algorithms, mathematical (number theory, algebra and linear algebra) algorithms, and string matching algorithms. We study algorithm analysis - worst case, average case, and amortized, with an emphasis on the close connection between the time complexity of an... ( 8 reviews ) Topics: algorithms, algorithm design
History of prime numbers The Sieve of Eratosthenes is a simple, ancient algorithm for finding all prime numbers up to a specified integer. It is the predecessor to the modern Sieve of Atkin, which is faster but more complex. The eponymous Sieve of Eratosthenes was created in the 3rd century BC by Eratosthenes, an ancient Greek mathematician. The Sieve of Eratosthenes is a simple, ancient algorithm for finding all prime numbers up to a specified integer. It is the predecessor to the modern... Topic: Prime Number Algorithm
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of K-Means Clustering AlgorithmInformation world meet many confronts nowadays and one such, is data retrieval from a multidimensional and heterogeneous data set. Han & et al carried out a trail for the mentioned challenge. A novel feature co-selection for web document clustering is proposed by them, which is called Multitype Features Co-selection for Clustering (MFCC). MFCC uses intermediate clustering results in one... Topics: MFCC algorithm, Search Engine, Ranking algorithm, Information Retrieval
This paper designs a hybrid genetic algorithm for job-shop scheduling combined with a Genetic Algorithm (GA), Simulated Annealing (SA), and a Tabu Search (TS) algorithm. It gives a method for initial population generation for avoiding unreasonable solutions, and introduces SA and TS into the genetic operation mechanism of GA for overcoming the lack of job-shop scheduling optimization. Simulated computations show the superiority of the hybrid genetic algorithm, and examples verify the... Topics: Job-shop Scheduling, Genetic Algorithm, Simulated Annealing Algorithm, Tabu Search
Epidemic applications of power electronic basednon-linear loads result in increase of harmonics in the powersystem. The current harmonics produced by these non-linearloads result in voltage distortion and leads to various powerquality problems. So it is important to eliminate theharmonics in the power system. The harmonic eliminationthrough Shunt Active Power filter (SAPF) provides higherefficiency and more pliable when compared with passive filters.This paper presents a standard surrogate and... Topics: Power Quality, SAPF, PI Control Algorithm, Fuzzy Control Algorithm.
Improving Utilization of Infrastructure CloudA key advantage of Infrastructure-as-a-Service (IaaS) cloud is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either significantly overprovision their infrastructure (or pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the access is no longer on-demand). At the same time, not all users require truly on-demand access to... Topics: MFCC algorithm, Search Engine, Ranking algorithm, Information Retrieval
In the last few years, there has been explosive growth in the application of meta-heuristics algorithm for solving Sudoku puzzles in computer science. In this paper we present a hybrid genetic algorithm (HGA) that uses a “random” technology to improve the performance of genetic algorithm. We also show the performance of the algorithms for solving Sudoku puzzles with 46 different examples. The experimental results indicate that HGA is able to produce very competitive results with respect to... Topics: Sudoku, Hybrid Genetic Algorithm, Metaheuristics Algorithm, Optimization, Random Search Strategy
Martin Pelikan, & David E. Goldberg (2000). Hierarchical Problem Solving by the Bayesian Optimization Algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-200), 267-274. Also IlliGAL Report No. 2000002. Abstract: The paper discusses three major issues. First, it discusses why it makes sense to approach problems in a hierarchical fashion. It defines the class of hierarchically decomposable functions that can be used to test the algorithms that approach... Topics: hierarchical Bayesian optimization algorithm, hBOA, estimation of distribution algorithm, EDA
Multicast services are increased in exponential manner in these last few years and in particular in the field of multimedia services. Multicast can reduce resources allocation and enhance network performances in terms of QoS, especially in a wireless platforms where the bandwidth is a precious resource. The problem of multicast routing can be reduced to the problem of finding a spanning tree capable to distribute network flow among multicast sources and destinations. It has been established... Topics: Scalable Algorithm, Multicast routing, heterogeneous platforms, Genetic Algorithm, Simulated...
This paper presents the application of Compressive Sensing (CS) theory in radar signal processing. CS uses the sparsity property to reduce the number of measurements needed for digital acquisition, which causes reduction in the size, weight, power consumption, and the cost of the CS radar receiver. Complex Approximate Message Passing (CAMP) algorithm is a fast iterative thresholding algorithm which is used to reconstruct the undersampled sparse radar signal, and to improve the Signal-to-Noise... Topics: Compressive Sensing, CAMP algorithm, Radar.
byMartin Pelikan, David E. Goldberg, Erick Cantu-Paz
Martin Pelikan, David E. Goldberg, & Erick Cantú-Paz, E. (1999). BOA: The Bayesian optimization algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-99), I, 525-532. Also IlliGAL Report No. 99003. Abstract In this paper, an algorithm based on the concepts of genetic algorithms that uses an estimation of a probability distribution of promising solutions in order to generate new candidate solutions is proposed. To estimate the distribution, techniques for... Topics: Bayesian optimization algorithm, BOA, estimation of distribution algorithm, EDA, genetic algorithm,...
This paper proposes an approach based on Bacterial Foraging Algorithm (BFA) for optimal placement of Distribution Generations (DGs). The optimal sitting and sizing of distributed generation is formulated as a multi-objective function including the network power losses minimization and voltage profile improvement. BFA algorithm has been employed to optimize the problem. To demonstrate the effectiveness of the proposed approach, it has been applied to 33 and 69 bus systems. The results of the... Topics: Distributed Generation, Optimal Placement, Bacterial Foraging Algorithm (BFA), Genetic Algorithm...
The purpose of the Simple Genetic Algorithm for Music (sGA) workshop is to stimulate new ways of working collaboratively and in performance with open source materials. Kim Cascone's approach is based on a simple genetic algorithmic which is 'executed' by the participants. The concept for this workshop was inspired by John Maeda's "Human Powered Computer Experiment". In this experiment Maeda recreated the internal operations of a simple computer using people to physically transport... Topics: Brussels, Laptop, Genetic, Algorithm, sGA, Workshop, Microsound
Feature subset selection is a process of selecting asubset of minimal, relevant features and is a pre processingtechnique for a wide variety of applications. High dimensionaldata clustering is a challenging task in data mining. Reducedset of features helps to make the patterns easier to understand.Reduced set of features are more significant if they areapplication specific. Almost all existing feature subsetselection algorithms are not automatic and are not applicationspecific. This paper made... Topics: feature subset selection, Genetic Algorithm and clustering
Forecasting always plays an important role in business, technology and many others and it helps organizations to increase profits, reduce lost sales and more efficient production planning. A parallel algorithm for forecasting reported recently on OTIS-Mesh. This parallel algorithm requires 5( root n– 1) electronic steps and 4 optical steps. In this paper we present an improved parallel algorithm for time series short term forecasting using OTIS-Mesh. This parallel algorithm requires 5(-1)... Topics: Time Series Forecasting, Parallel Algorithm, OTIS-Mesh.
Existing coupling metrics only use the number ofmethods invocations, and does not consider the weight of themethods. Thus, they cannot measure coupling metricsaccurately. In this paper, we measure the weight of methodsusing PageRank algorithm, and propose a new approach toimprove coupling metrics using the weight. We validate theproposed approach by applying them to several open sourceprojects. And we measure several coupling metrics usingexisting approach and proposed approach. As a result,... Topics: software quality metrics, coupling metrics, PageRank algorithm
With the development of the digital devices, computers and networks, our world relies more and more on the digital data. In many cases, storing data safely is a very big concern. These data have to be protected so as to prevent the possible unauthorized access. Many technologies have been used to improve the security of the data storage. Encryption is a process of coding information which could either be a file or mail message in into cipher text a form unreadable without a decoding key in... Topics: RC4, AES, Chaos based algorithm
The classical hypothesis underlying measurement and representation of natural phenomena is based on the analytic proposition. The traditional assumption is that stimulus - response pairs can be studied with respect to intensity or power and resistence to change. In contrast, the Schema hypothesis advanced, assumes the synthetic proposition as the foundation of an approach that observes dynamics and invariance under change as essential. The developed model and procedures for schematization... Topics: schema, synthesis, algorithm, agent control, ecology, topographic